Who's a target, how it gets in, and what to do if you're infected. Read More ▶ |
|
| White Paper: Symantec Cyber criminals grow more professional and devious every day. You face relentless sophisticated attacks, targeting information vital to your safety and brand. When you're stretched defending against both targeted and random threats, you'll lose focus and steal resources from the rest of your business. Read More ▶ | NSA whistleblower Edward Snowden has come up with a concept iPhone case that can help prevent the government from finding your location. Read More ▶ |
| A spear phishing tool to automate the creation of phony tweets - complete with malicious URLs – with messages victims are likely to click on will be released at Black Hat by researchers from ZeroFOX. Called SNAP_R (for social network automated phisher with reconnaissance), the tool runs through a target Twitter account to gather data on what topics seem to interest the subscriber. Then it writes a tweet loaded up with a link to a site containing malware and sends it. Read More ▶ |
| Security researchers have released tools this week that could help users recover files encrypted by two relatively new ransomware threats: Bart and PowerWare. Read More ▶ |
| | Jono Bacon talks about HackerOne, a platform that help companies secure their software by opening it up to hackers. Read More ▶ |
| White Paper: CloudFlare Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. Read More ▶ | You have lots of good stuff to look forward to in the next major release of Windows 10. Here are the highlights. ▶ | Every company may be a software company now, but that doesn’t mean you have to build it all yourself. When can you buy the same standard apps your competitors use? Why should you invest in building your own? And when you do build, how little code can you get away with? We explain. ▶ |
|
|
|